{"id":"https://openalex.org/W4414079851","doi":"https://doi.org/10.1109/mcom.001.2400750","title":"Controllable Steganography for Robust and Efficient Semantic Communication Systems","display_name":"Controllable Steganography for Robust and Efficient Semantic Communication Systems","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414079851","doi":"https://doi.org/10.1109/mcom.001.2400750"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.001.2400750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.001.2400750","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020816945","display_name":"Shouxiang Ni","orcid":"https://orcid.org/0009-0006-9416-0102"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shouxiang Ni","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100654860","display_name":"Guanghui Liu","orcid":"https://orcid.org/0000-0002-4170-4552"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guolian Liu","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112217736","display_name":"Sheng Xiang","orcid":"https://orcid.org/0000-0001-7776-3645"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Xiang","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100413655","display_name":"Ang Li","orcid":"https://orcid.org/0000-0003-2385-6963"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ang Li","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021327800","display_name":"Liang Zhou","orcid":"https://orcid.org/0000-0002-9453-3734"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Zhou","raw_affiliation_strings":["Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Posts and Telecommunications, Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology,China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073527013","display_name":"Yi Qian","orcid":"https://orcid.org/0000-0001-5671-916X"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yi Qian","raw_affiliation_strings":["University of Nebraska-Lincoln,Department of Electrical and Computer Engineering,USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln,Department of Electrical and Computer Engineering,USA","institution_ids":["https://openalex.org/I114395901"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5020816945"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22717624,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"64","issue":"1","first_page":"160","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.781000018119812},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5121999979019165},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.43860000371932983},{"id":"https://openalex.org/keywords/semantic-grid","display_name":"Semantic grid","score":0.43380001187324524},{"id":"https://openalex.org/keywords/semantic-computing","display_name":"Semantic computing","score":0.4244999885559082},{"id":"https://openalex.org/keywords/semantic-integration","display_name":"Semantic integration","score":0.3950999975204468},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3889999985694885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38519999384880066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8826000094413757},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.781000018119812},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5121999979019165},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.43860000371932983},{"id":"https://openalex.org/C103692084","wikidata":"https://www.wikidata.org/wiki/Q1765824","display_name":"Semantic grid","level":3,"score":0.43380001187324524},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.4244999885559082},{"id":"https://openalex.org/C110903229","wikidata":"https://www.wikidata.org/wiki/Q7449064","display_name":"Semantic integration","level":4,"score":0.3950999975204468},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3889999985694885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C2129575","wikidata":"https://www.wikidata.org/wiki/Q54837","display_name":"Semantic Web","level":2,"score":0.36039999127388},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3547999858856201},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.3531000018119812},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35019999742507935},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.34610000252723694},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.3253999948501587},{"id":"https://openalex.org/C6881194","wikidata":"https://www.wikidata.org/wiki/Q7449091","display_name":"Semantic technology","level":4,"score":0.32409998774528503},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2897000014781952},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27320000529289246},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2619999945163727},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.2606000006198883},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2599000036716461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25529998540878296},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mcom.001.2400750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.001.2400750","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4581646638","display_name":null,"funder_award_id":"62231017,62427802,62306151","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327518","display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1995875735","https://openalex.org/W2892948265","https://openalex.org/W3036851434","https://openalex.org/W3175755605","https://openalex.org/W3198139956","https://openalex.org/W4214543711","https://openalex.org/W4294691151","https://openalex.org/W4384158379","https://openalex.org/W4384948607","https://openalex.org/W4386737033","https://openalex.org/W4388936959"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999","https://openalex.org/W2265739152","https://openalex.org/W2094307307"],"abstract_inverted_index":{"As":[0],"a":[1,67,85,113,119,141,168],"significant":[2],"direction":[3],"in":[4,49,56,194],"next-generation":[5],"communication":[6,9,58,74],"technology,":[7],"semantic":[8,17,26,57,73,92,121,144],"systems":[10],"aim":[11],"to":[12,77,128,136,149,175],"achieve":[13,150],"efficient":[14],"transmission":[15],"of":[16,25,39,104,164,190],"information.":[18],"In":[19],"high-threat":[20],"environments,":[21],"protecting":[22],"the":[23,37,105,162,185,191],"concealment":[24,45,187],"information":[27],"is":[28,94,110,123,147,182],"crucial,":[29],"as":[30,42],"traditional":[31],"encryption":[32],"methods":[33],"can":[34],"easily":[35],"attract":[36],"attention":[38],"attackers.":[40],"Steganography,":[41],"an":[43],"effective":[44],"technique,":[46],"faces":[47],"challenges":[48],"coding":[50],"efficiency":[51],"that":[52],"hinder":[53],"its":[54],"applicability":[55],"systems.":[59],"To":[60],"address":[61],"these":[62],"issues,":[63],"this":[64],"article":[65],"proposes":[66],"controllable":[68,114],"steganography":[69,86],"method":[70,193],"suitable":[71],"for":[72],"systems,":[75],"aiming":[76],"balance":[78],"concealment,":[79],"efficiency,":[80],"and":[81,133,152,158,178,188],"resource":[82],"constraints.":[83],"First,":[84],"framework":[87],"based":[88],"on":[89],"redundancy-":[90],"free":[91],"representation":[93],"constructed.":[95],"By":[96],"directly":[97],"embedding":[98],"secret":[99,156],"semantics":[100,103,132,157],"within":[101],"cover":[102,131],"same":[106],"dimension,":[107],"bandwidth":[108],"utilization":[109],"enhanced.":[111],"Second,":[112],"encoding":[115],"strategy":[116],"driven":[117],"by":[118],"conditional":[120],"generator":[122],"designed,":[124],"utilizing":[125],"dynamic":[126],"sampling":[127],"generate":[129],"diverse":[130],"enhance":[134],"resistance":[135,174],"reverse":[137,179],"inference":[138,180],"attacks.":[139],"Next,":[140],"lightweight":[142],"reversible":[143],"mapping":[145,154],"component":[146],"developed":[148],"high-fidelity":[151],"low-latency":[153],"between":[155],"steganographic":[159],"semantics,":[160],"meeting":[161],"requirements":[163],"low-power":[165],"devices.":[166],"Finally,":[167],"comprehensive":[169],"security":[170,189],"evaluation":[171],"system":[172],"covering":[173],"detection":[176],"attacks":[177,181],"established,":[183],"validating":[184],"superior":[186],"proposed":[192],"various":[195],"threat":[196],"environments.":[197]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
